CN106844599B - A kind of personalized privacy information search method based on data mapping - Google Patents
A kind of personalized privacy information search method based on data mapping Download PDFInfo
- Publication number
- CN106844599B CN106844599B CN201710028191.6A CN201710028191A CN106844599B CN 106844599 B CN106844599 B CN 106844599B CN 201710028191 A CN201710028191 A CN 201710028191A CN 106844599 B CN106844599 B CN 106844599B
- Authority
- CN
- China
- Prior art keywords
- data
- retrieval
- buyer
- puppet
- referring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2457—Query processing with adaptation to user needs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a kind of personalized privacy information search methods based on data mapping, the both parties of data trade platform negotiate the reference column retrieved, the seller carries out puppet ID number to its data record and carries out data mapping, and it is encrypted to obtain referring to column data ciphertext using irreversible encryption algorithm, send jointly to buyer, buyer obtains inquiry referring to column data ciphertext using identical irreversible encryption algorithm, inquiry obtains corresponding puppet ID, (k-1) M false puppet ID is generated according to privacy requirement parameter k, then the corresponding puppet ID building k anonymity set of retrieval data needed for (k-1) M false puppet ID and M is sent to the seller, the data record collection that retrieval obtains is sent to buyer by the seller, needed for buyer filters out in retrieval record set according to its true retrieval referring to the corresponding puppet ID of column data Retrieval record, obtains search result.It may be implemented to retrieve content to buyer using the present invention and be intended to the good protection of privacy.
Description
Technical field
The invention belongs to the technical field of information retrieval in data trade, more specifically, are related to a kind of based on data
The personalized privacy information search method of mapping.
Background technique
As the network information technology develops rapidly, all trades and professions constantly increase the demand of data, whether in science
Boundary is still intended to the available data for meeting production and research in industry, and data play in people's lives
More and more important role.The every profession and trades such as government department, establishment or research institution require a large amount of data input to expire
The miscellaneous demand of foot, but data be it is complicated, changeable, therefore, every profession and trade, which just needs to search for from mass data, to be had
Meet itself needs with information.But it is likely to result in letting out for the individual commercial intention for inquiring content privacy and issuer in this way
Dew, in terms of consequent is various solution private informations (such as daily habits, bad history, prestige degree, previous medical history)
Research, to ensure that the utilization of information while meeting industry requirement can guarantee that individual privacy and commercial intention are not let out
Dew.Exactly such demand makes safe and reliable data trade platform come into being, and it is hidden to provide protection data subject for user
Private security privacy platform.
Most representative in the data retrieval model of various protection privacies is privacy information retrieval protection model, privacy
Years of researches are passed through in information retrieval, have formd the theoretical system of comparatively perfect.Although there is also certain for certain methods
Defect, but with the solution of some critical issues, privacy information retrieval will be applied to every field, many industries more and more
The interests of provider and the commercial interest of issuer are inquired in order to protect data, introduce privacy information search method.
After entering big data era, various data are constantly merged, and each great institutions have enough data, still
When they want to inquire data by other mechanisms, they are not desired to the data to stick one's chin out to data providing, however right
In there is no effective solution methods in the current industry of such demand.
Summary of the invention
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of personalized privacy letters based on data mapping
Search method is ceased, realizes and content is retrieved to buyer and is intended to the good protection of privacy.
For achieving the above object, the present invention is based on the personalized privacy information search methods of data mapping, including with
Lower step:
S1: the both parties of data trade platform negotiate the reference column R retrieved;
S2: the data record in its database is carried out puppet ID and numbered by the seller, to the number in every data record referring to column R
It is encrypted to obtain according to using irreversible encryption algorithm referring to column data ciphertext, the pseudo- ID and reference that the seller records every data
Column data ciphertext is sent to buyer;
S3: buyer extracts in the data oneself to be retrieved referring to the corresponding data of column R, using it is identical with the seller not
Irreversible cryptographic algorithm is encrypted, and obtains retrieval referring to column data in received pseudo- ID and referring to inquiry in column data ciphertext
Then the corresponding puppet ID of ciphertext generates (k-1) M false puppet ID, wherein k indicates the privacy requirement parameter of buyer, and k > 1, M are indicated
Buyer retrieves referring to column data number, and (k-1) M vacation puppet ID is anonymous with to retrieval reference column data corresponding puppet ID composition k
Set, is sent to the seller;
S4: the seller according to transmitted by buyer come k anonymity set, in its database retrieval obtain data record collection, send out
Give buyer;
S5: buyer records referring to the corresponding puppet ID of column data in retrieval after receiving retrieval record set according to its true retrieval
Retrieval record, obtains search result needed for concentration filters out.
The present invention is based on the personalized privacy information search method of data mapping, the both parties of data trade platform negotiate
The reference column retrieved, the seller carries out puppet ID number to its data record and carries out data mapping, and is calculated using irreversible encryption
Method is encrypted to obtain referring to column data ciphertext, sends jointly to buyer, and buyer is obtained using identical irreversible encryption algorithm
Inquiry obtains corresponding puppet ID referring to column data ciphertext, inquiry, generates (k-1) M false puppet ID according to privacy requirement parameter k, so
The corresponding puppet ID building k anonymity set of retrieval data needed for (k-1) M false puppet ID and M is sent to the seller afterwards, the seller will examine
The data record collection that rope obtains is sent to buyer, and buyer records referring to the corresponding puppet ID of column data in retrieval according to its true retrieval
Retrieval record, obtains search result needed for concentration filters out.It may be implemented to retrieve content to buyer and be intended to hidden using the present invention
Private good protection.
Detailed description of the invention
Fig. 1 is that the present invention is based on the specific embodiment flow charts of the personalized privacy information search method of data mapping.
Specific embodiment
A specific embodiment of the invention is described with reference to the accompanying drawing, preferably so as to those skilled in the art
Understand the present invention.Requiring particular attention is that in the following description, when known function and the detailed description of design perhaps
When can desalinate main contents of the invention, these descriptions will be ignored herein.
Embodiment
Fig. 1 is that the present invention is based on the specific embodiment flow charts of the personalized privacy information search method of data mapping.
As shown in Figure 1, the present invention is based on the specific steps of personalized privacy information search method of data mapping to include:
S101: both parties negotiate retrieval referring to column:
The both parties of data trade platform negotiate reference column R, such as identification card number, cell-phone number retrieved etc..It is logical
This mode is crossed, retrieval reference column can be determined according to the self-demand situation of buyer and the data of seller offer situation, from
And provide personalized information retrieval.
S102: the seller is based on data mapping encrypting data:
Data record in its database is carried out puppet ID number by the seller, to the data in every data record referring to column R
It is encrypted to obtain referring to column data ciphertext using irreversible encryption algorithm, pseudo- ID that the seller records every data and referring to column
Data ciphertext is sent to buyer.
Pseudo- ID number is exactly to carry out Unified number to data record, can be considered as and be mapped data record, will be every
Data record is indicated with puppet ID.Remember that the data record quantity in vendor data library is N in the present embodiment, puppet ID is
Then pseudo- ID is sent to buyer then the pseudo- ID of data record is 0-N-1 by natural number.Obviously, pseudo- ID is equally distributed,
Thus have ignored the distribution situation of real data, it is therefore prevented that the problem of according to data distribution steal information.Table 1 is this reality
Seller's stored data in example is applied to record.
Table 1
As shown in table 1, the seller preserves 1000 datas record in the present embodiment, therefore its puppet ID is 0-999.
The seller needs to add referring to the data of column R using irreversible encryption algorithm in every data record in the present invention
It is close to obtain referring to column data ciphertext, it is assumed that the reference column R selected in the present embodiment is PhoneNum, then needs to each
The characteristics of PhoneNum is encrypted, irreversible encryption algorithm can not exactly decrypt to obtain original plaintext according to ciphertext.This implementation
Irreversible encryption is carried out using SHA (Secure Hash Algorithm, secure hash algorithm) 256 Encryption Algorithm in example, it should
Algorithm can be any kind of data conversion at 256 data summarizations, and two different data will not generate same number
According to abstract.By taking PhoneNum " 15955592645 " as an example, the ciphertext that uses SHA256 Encryption Algorithm to obtain for
"3BE481CA29E74A01 367CEACA 0B5C7F5E E53E9A40 7D26D436 8EDD5395 41F7B13C".This is close
Text be it is irreversible, this ciphertext cannot be changed into cell-phone number.The pseudo- ID and ginseng that every data is recorded to the seller in the present invention
It is sent to buyer according to column data ciphertext, vendor data safety can be effectively ensured.
S103: buyer generates query set:
Buyer extracts in the data oneself to be retrieved referring to the corresponding data of column R, using it is identical with the seller can not
Reverse encryption algorithm is encrypted, and in received pseudo- ID and referring to inquiry in column data ciphertext to obtain retrieval close referring to column data
Then the corresponding puppet ID of text generates (k-1) M false puppet ID, wherein k indicates the privacy requirement parameter of buyer, and k > 1, M expression are bought
Side's retrieval constitutes k anonymity set referring to column data number, by (k-1) M vacation puppet ID puppet ID corresponding with retrieval reference column data,
It is sent to the seller.
Table 2 is the retrieval of buyer in the present embodiment referring to column data and corresponding puppet ID.
Id | PhoneNum |
0 | 15253592634 |
1 | 18753594256 |
2 | 18625562646 |
3 | 15642592185 |
4 | 15955592792 |
Table 2
As shown in table 2, in the present embodiment, need to inquire 5 data, corresponding puppet ID is 0,1,2,3,4.K=is set
2, it is therefore desirable to which the mantissa data bulk of generation is 5, that is, generates 5 false puppet ID, k anonymity is constituted together with the age data in table 1
Set.Table 3 is the k anonymity set in the present embodiment.
Id |
0 |
8 |
10 |
2 |
25 |
1 |
3 |
105 |
4 |
101 |
Table 3
As it can be seen that after buyer is retrieved reference column data using the same manner progress irreversible encryption in the present invention, according to
Ciphertext inquires to obtain pseudo- ID, and regeneration vacation puppet ID constitutes k anonymity set together, in this way when transmitting retrieval data, transmission
Not retrieval is referring to column data, but special distribution characteristics or other data characteristics is not present in puppet ID, pseudo- ID data, even if by
The retrieval for being also difficult to obtain buyer is stolen referring to column data.And due to joined false puppet ID, the seller will not learn buyer's
True retrieval content and intention privacy, strengthen the protection to buyer.
S104: seller information retrieval and feedback:
The seller according to transmitted by buyer come k anonymity set retrieve obtain data record collection in its database, and send
To buyer.
S105: buyer obtains search result:
After buyer receives retrieval record set, according to its true retrieval referring to the corresponding puppet ID of column data in retrieval record set
In filter out needed for retrieval record, obtain search result.
From the above description, it can be seen that both parties are retrieved through consultation referring to column, Lai Shixian customized information in the present invention
Retrieval, the data record in its database is carried out puppet ID number to realize that data map by the seller in retrieving, then will
It is encrypted referring to column data using irreversible encryption algorithm, buyer encrypts retrieval referring to column data, filters out retrieval
It referring to the corresponding puppet ID of column data ciphertext, is sent to the seller and retrieves, to solve in privacy information retrieval in retrieval
Hold and be intended to Privacy Protection.
Although the illustrative specific embodiment of the present invention is described above, in order to the technology of the art
Personnel understand the present invention, it should be apparent that the present invention is not limited to the range of specific embodiment, to the common skill of the art
For art personnel, if various change the attached claims limit and determine the spirit and scope of the present invention in, these
Variation is it will be apparent that all utilize the innovation and creation of present inventive concept in the column of protection.
Claims (2)
1. a kind of personalized privacy information search method based on data mapping, which comprises the following steps:
S1: the both parties of data trade platform negotiate the reference column R retrieved;
S2: the data record in its database is carried out puppet ID and numbered by the seller, is adopted to the data in every data record referring to column R
It is encrypted to obtain referring to column data ciphertext with irreversible encryption algorithm, pseudo- ID that the seller records every data and referring to columns
Buyer is sent to according to ciphertext;
S3: buyer is extracted in the data oneself to be retrieved referring to the corresponding data of column R, using identical with the seller irreversible
Encryption Algorithm is encrypted, and obtains retrieval referring to column data ciphertext in received pseudo- ID and referring to inquiry in column data ciphertext
Then corresponding puppet ID generates (k-1) M false puppet ID, wherein k indicates the privacy requirement parameter of buyer, and k > 1, M indicate buyer
Retrieval constitutes k anonymity set, hair referring to column data number, by (k-1) M vacation puppet ID puppet ID corresponding with retrieval reference column data
Give the seller;
S4: the seller according to transmitted by buyer come k anonymity set retrieve obtain data record collection in its database, as retrieval
Record set is sent to buyer;
S5: after buyer receives retrieval record set, according to its true retrieval referring to the corresponding puppet ID of column data in retrieval record set
In filter out needed for retrieval record, obtain search result.
2. personalization privacy information search method according to claim 1, which is characterized in that the irreversible encryption algorithm
Using SHA256 Encryption Algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710028191.6A CN106844599B (en) | 2017-01-13 | 2017-01-13 | A kind of personalized privacy information search method based on data mapping |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710028191.6A CN106844599B (en) | 2017-01-13 | 2017-01-13 | A kind of personalized privacy information search method based on data mapping |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106844599A CN106844599A (en) | 2017-06-13 |
CN106844599B true CN106844599B (en) | 2019-06-21 |
Family
ID=59123382
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710028191.6A Active CN106844599B (en) | 2017-01-13 | 2017-01-13 | A kind of personalized privacy information search method based on data mapping |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106844599B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107454070B (en) * | 2017-07-24 | 2019-06-25 | 华东师范大学 | A kind of personalized privacy information search method based on block chain |
CN108768608B (en) * | 2018-05-25 | 2020-05-12 | 电子科技大学 | Privacy protection identity authentication method supporting thin client under block chain PKI |
CN110858251B (en) * | 2018-08-22 | 2020-07-21 | 阿里巴巴集团控股有限公司 | Data query method and device |
CN110457945B (en) * | 2019-08-01 | 2021-03-02 | 卫盈联信息技术(深圳)有限公司 | List query method, query party device, service party device and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101017559A (en) * | 2007-03-09 | 2007-08-15 | 成都死海盐疗健康馆服务有限公司 | Method for establishing business trading web platform and trade term decided by buyer |
CN101178801A (en) * | 2006-12-20 | 2008-05-14 | 腾讯科技(深圳)有限公司 | Network trading method and system |
CN105718818A (en) * | 2016-03-07 | 2016-06-29 | 卫晓东 | Personal information secrecy method and personal information secrecy system for internet shopping |
-
2017
- 2017-01-13 CN CN201710028191.6A patent/CN106844599B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101178801A (en) * | 2006-12-20 | 2008-05-14 | 腾讯科技(深圳)有限公司 | Network trading method and system |
CN101017559A (en) * | 2007-03-09 | 2007-08-15 | 成都死海盐疗健康馆服务有限公司 | Method for establishing business trading web platform and trade term decided by buyer |
CN105718818A (en) * | 2016-03-07 | 2016-06-29 | 卫晓东 | Personal information secrecy method and personal information secrecy system for internet shopping |
Also Published As
Publication number | Publication date |
---|---|
CN106844599A (en) | 2017-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107454070B (en) | A kind of personalized privacy information search method based on block chain | |
CN106127075B (en) | Encryption method can search for based on secret protection under a kind of cloud storage environment | |
CN106909617B (en) | A kind of personalized privacy information search method based on data fitting | |
CN106844599B (en) | A kind of personalized privacy information search method based on data mapping | |
Guo et al. | Fine-grained database field search using attribute-based encryption for e-healthcare clouds | |
CN109784931B (en) | Query method of data query platform based on blockchain | |
CN1776701B (en) | Techniques for defining, using and manipulating rights management data structures | |
CN106687984B (en) | Device and method for Data Matching and anonymization | |
CN105723681B (en) | For protecting partner's coding of the anonymous link of consumer privacy | |
CN102713995A (en) | Confidential search system and encryption processing system | |
CN105592085B (en) | The method for secret protection of facing position perception recommender system | |
CN104102483A (en) | Method and system for securely using public services for private or enterprise purposes | |
CN109361644A (en) | A kind of Fog property base encryption method for supporting fast search and decryption | |
Zhang et al. | Privacyasst: Safeguarding user privacy in tool-using large language model agents | |
CN110765488B (en) | Data storage and reading method and electronic equipment | |
JP2001265771A (en) | Device and method for managing personal information and recording medium recording program for executing the device or method | |
CN108377319A (en) | picture transmission method and device | |
CN114091062A (en) | Occupational data processing method and device | |
Hussain et al. | Sharing is caring–design and demonstration of a data privacy tool for interorganizational transfer of data | |
CN111597582B (en) | Method for constructing encrypted inverted rectangular tree and space keyword query method | |
Rai et al. | Pseudonymization techniques for providing privacy and security in EHR | |
Vidhya et al. | Fusion-based advanced encryption algorithm for enhancing the security of Big Data in Cloud | |
Swathi et al. | Virtual Health Assistant | |
Yogeshwar et al. | Building dynamic permutation based privacy preservation model with block chain technology for IoT healthcare sector | |
US20100145807A1 (en) | Device for management of personal data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |